"... Emerging smart contract systems over decentralized cryp-tocurrencies allow mutually distrustful parties to transact safely with each other without trusting a third-party inter-mediary. In the event of contractual breaches or aborts, the decentralized blockchain ensures that other honest parties obta ..."

obtain commesurate remuneration. Existing systems, how-ever, lack transactional privacy. All transactions, including flow of money between pseudonyms and amount trasacted, are exposed in the clear on the blockchain. We present Hawk, a decentralized smart contract system that does not store financial

"... v1.01 MetaDisk is an open source software project seeking to prove concep-tually that cloud storage applications can be made more decentralized, more secure, and more efficient. In addition, MetaDisk provides a proto-typing platform for a fully decentralized network. In pursuit of this goal, we prop ..."

v1.01 MetaDisk is an open source software project seeking to prove concep-tually that cloud storage applications can be made more decentralized, more secure, and more efficient. In addition, MetaDisk provides a proto-typing platform for a fully decentralized network. In pursuit of this goal, we

"... Bitcoin exchanges function like banks, securely holding their cus-tomers ’ bitcoins on their behalf. Several exchanges have suffered catastrophic losses with customers permanently losing their sav-ings. A proof of solvency demonstrates that the exchange controls sufficient reserves to settle each cu ..."

Bitcoin exchanges function like banks, securely holding their cus-tomers ’ bitcoins on their behalf. Several exchanges have suffered catastrophic losses with customers permanently losing their sav-ings. A proof of solvency demonstrates that the exchange controls sufficient reserves to settle each

by
Erich Nahum, David J. Yates, Hilarie Orman
- In Proceedings of the Internet Society Symposium Network and Distributed System Security, 1996

"... Security and privacy are growing concerns in the Internet community, due to the Internet’s rapid growth and the desire to conduct business over it safely. This desire has led to the advent of several proposals for security standards, such as secure IP, secure HTTP, and the Secure Socket Layer. All o ..."

Security and privacy are growing concerns in the Internet community, due to the Internet’s rapid growth and the desire to conduct business over it safely. This desire has led to the advent of several proposals for security standards, such as secure IP, secure HTTP, and the Secure Socket Layer. All

"... Lightweight Bitcoin clients are gaining increasing adoption among Bitcoin users, owing to their reduced resource and bandwidth con-sumption. These clients support a simplified payment verification (SPV) mode as they are only required to download and verify a part of the block chain—thus supporting t ..."

forward to those clients transactions relevant to their out-sourced Bloom filters. In this paper, we explore the privacy of existing SPV clients. We show analytically and empirically that the reliance on Bloom filters within existing SPV clients leaks considerable information about the addresses

"... Bitcoin is a decentralized digital currency, introduced in 2008, that has recently gained noticeable popularity. Its main features are: (a) it lacks a central authority that controls the transactions, (b) the list of transactions is publicly available, and (c) its syntax allows more advanced transac ..."

transactions than simply transferring the money. The goal of this paper is to show how these properties of Bitcoin can be used in the area of secure multiparty computation protocols (MPCs). Firstly, we show that the Bitcoin system provides an attractive way to construct a version of “timed commitments”, where

"... This research investigates techniques for providing privacy, authentication, and data integrity to message passing in distributed applications. Various software mechanisms for message hashing and encryption are evaluated, including techniques for key generation and key distribution. Different crypto ..."

crypto-APIs' are evaluated, and the distribution of a single session key for n-party communication is implemented. A secure version of PVM (Parallel Virtual Machine) is developed using Diffie-Hellman, MD5, and various symmetric encryption algorithms to provide message privacy, authentication

"... Abstract—Bitcoin is the first e-cash system to see widespread adoption. While Bitcoin offers the potential for new types of financial interaction, it has significant limitations regarding privacy. Specifically, because the Bitcoin transaction log is completely public, users ’ privacy is protected on ..."

Abstract—Bitcoin is the first e-cash system to see widespread adoption. While Bitcoin offers the potential for new types of financial interaction, it has significant limitations regarding privacy. Specifically, because the Bitcoin transaction log is completely public, users ’ privacy is protected